About your Search

20121101
20121130
Search Results 0 to 0 of about 1
. our friends from the fbi were talking earlier about a number of these -- let's start with the criminal groups. organized crime, they can have a systemic content. they want to also may be pro the law enforcement sensitive systems to get information to understand what threats against them are. then there are small-time criminal operations intent on fraud or identity theft. these may be small groups or individuals. then you look at hackers, those who are just the techno geeks to do it to see if they can, go after systems not protected. then of course the hackers can be hired by any of these other -- origins to further their crimes. we have insiders, could be disgruntled employees who want to harm that information system and disrupt the company or agency's operation. or the insider could be a spy. taking that information and passing it to his or her handler and passing it to a foreign intelligence service. then we have nations and state- sponsored threats. i do not want to steal any thunder from dr. jones's presentation on chinese threats tomorrow, but i want to talk about, there were some
Search Results 0 to 0 of about 1

Terms of Use (10 Mar 2001)